Google might scan your face and give you a $5 gift card for it - TechSpot - 0 views
-
""I don't really care about data privacy because I think it's all an illusion anyway." It's interesting to see how this encounter also reflects the general behavior of a majority of people when it comes to privacy. Although user data has long been a gold mine for companies, would it be more acceptable if they started paying their users in exchange for it?"
Ring: "We don't use facial recognition"; also Ring: "We have a head of facial recogniti... - 0 views
-
"For example, I've been repeatedly emailed by company spokespeople to tell me that cops only get access to Ring customers' videos if the customers offer to share it; but what they never said is that if a customer turns down a police request, Amazon instructs the cops to make an "official request" to the company and then they grant warrantless access to the footage. "
They told us DRM would give us more for less, but they lied / Boing Boing - 0 views
-
"My latest Locus Magazine column is DRM Broke Its Promise, which recalls the days when digital rights management was pitched to us as a way to enable exciting new markets where we'd all save big by only buying the rights we needed (like the low-cost right to read a book for an hour-long plane ride), but instead (unsurprisingly) everything got more expensive and less capable. "
Kevin Kelly on the future of the Internet in China / Boing Boing - 0 views
-
"There are three big challenges in the Internet space that all countries must face in the near future. China's approach to the challenges will impact not only Chinese Internet users, but potentially all Internet users. What interface follows the smart hone, whether it be AR-enabled glasses, foldable screens, or wearable projectors, will not only be influenced by China's substantial Internet-using population, but also by their manufacturing. Privacy, as it relates to online information collecting and sale, has consequences for broader community standards, and there is no one-size fits all approach to this issue. China must engage their own ethicists, community, government and technologists to develop a solution that works for China. Finally, globalization. Most of China's internet success has been within China, but as China begins to consider how it might attract users from outside its borders, it will need to consider dialing back the protections that have held foreign Internet companies at bay."
Adobe: to read the Terms of Use, you must agree to the Terms of Use / Boing Boing - 0 views
-
"I tried to start Adobe Acrobat today, part of the Creative Cloud suite, and it wouldn't start unless I agreed to new Terms of Use. But to read the Terms of Use, I had to agree to the Terms of Use first. This video shows me haplessly clicking the "Terms of Use" link only to be prevented from reading them because, of course, I had not agreed to the Terms of Use"
In China, Daydreaming Students Are Caught on Camera - The New York Times - 0 views
-
"School officials see the cameras as a way to improve student confidence and crowdsource the task of catching misbehaving pupils. Parents use the feeds to monitor their children's academic progress and spy on their friendships and romances. But many students see live-streaming as an intrusion, prompting a broader debate in China about privacy, educational ethics and the perils of helicopter parenting."
Wcry ransomware is reborn without its killswitch, starts spreading anew / Boing Boing - 0 views
-
" respite was thanks to a sloppy bit of programming from the worm's creator, who'd left a killswitch in the code: newly infected systems checked to see if a certain domain (iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com) existed before attempting to spread the infection; by registering this domain, security researchers were able to freeze the worm.The respite was thanks to a sloppy bit of programming from the worm's creator, who'd left a killswitch in the code: newly infected systems checked to see if a certain domain (iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com) existed before attempting to spread the infection; by registering this domain, security researchers were able to freeze the worm. But a day later, it's back, and this time, without the killswitch. Security researchers running honeypots have seen new infections by versions of the worm that can spread even when the iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com domain is live."
« First
‹ Previous
441 - 460 of 579
Next ›
Last »
Showing 20▼ items per page